The Conflicted Usage of RLUTs for Security-Critical Applications on FPGA.
Debapriya Basu RoyShivam BhasinJean-Luc DangerSylvain GuilleyWei HeDebdeep MukhopadhyayZakaria NajmXuan Thuy NgoPublished in: J. Hardw. Syst. Secur. (2018)
Keyphrases
- intrusion detection
- information security
- security requirements
- security issues
- high speed
- key management
- information assurance
- security problems
- hardware implementation
- real time
- data security
- security level
- low cost
- security policies
- statistical databases
- network security
- signal processing
- computer security
- security management
- security model
- image processing
- parallel hardware
- security measures
- real time image processing
- security properties
- cyber security
- security protocols
- data integrity
- security mechanisms
- efficient implementation